UBUNTU-CVE-2014-7300

Source
https://ubuntu.com/security/CVE-2014-7300
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-7300.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-7300
Upstream
Withdrawn
2025-07-18T16:43:05Z
Published
2014-12-25T21:59:00Z
Modified
2025-07-16T07:32:11.845942Z
Severity
  • Ubuntu - low
Summary
[none]
Details

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

References

Affected packages

Ubuntu:16.04:LTS / gnome-shell

Package

Name
gnome-shell
Purl
pkg:deb/ubuntu/gnome-shell@3.18.5-0ubuntu0.3?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.18.5-0ubuntu0.3

Affected versions

3.*
3.16.4-0ubuntu1
3.18.1-1ubuntu1
3.18.2-0ubuntu1
3.18.2-0ubuntu2
3.18.3-3ubuntu1
3.18.4-0ubuntu1
3.18.4-0ubuntu2
3.18.4-0ubuntu3
3.18.5-0ubuntu0.1
3.18.5-0ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "gnome-shell",
            "binary_version": "3.18.5-0ubuntu0.3"
        },
        {
            "binary_name": "gnome-shell-common",
            "binary_version": "3.18.5-0ubuntu0.3"
        },
        {
            "binary_name": "gnome-shell-dbg",
            "binary_version": "3.18.5-0ubuntu0.3"
        },
        {
            "binary_name": "gnome-shell-dbgsym",
            "binary_version": "3.18.5-0ubuntu0.3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-7300.json"